On 2009-03-04 at 23:24 -0800, Phil Pennock wrote:
> If you try my patch out, I'd appreciate feedback.  If you're peering
> with sks-peer.spodhuis.org then you might want to keep an eye on
> recon.log and see if you get an IPv6 peering.  :)  But please, keep a
> safe copy of your normal binary to fall back to.

Sorry to follow up to myself, but I'll note one design decision I forgot
to mention:

sks does random peering already.  When choosing an IP address from those
published by a hostname, I could choose to refactor the code to fallback
across IPs, or I could just make things a bit more random and randomly
choose one of the available IPs.

I chose to add the extra randomness.

Rationale:
 * the random connects should still let the peering mesh work
 * most people with IPv6 service will probably choose to move to IPv6
   recon within a short enough period of time that the gain would be
   short-lived
 * if someone really doesn't want to peer over IPv6, then either:
   (a) they're IPv4-only, so this doesn't affect them at all
   or
   (b) they should ask their peers to use a hostname which doesn't have
       AAAA records in membership files

Just be aware that you'll see more of your outbound connections failing,
if the remote side uses a hostname with AAAA records but no AAAA recon.

Note that a web-server proxying AAAA 11370 connections onto sks does not
work and will not work and never would have worked -- the code for
checking the hostname of a peer would have seen a connection from
localhost, and since you're not peering with localhost (I assume), this
would have failed the membership test.  A proxy will only ever be a
work-around for the HKP port.

Regards,
-Phil

Attachment: pgptKyPNCSgem.pgp
Description: PGP signature

_______________________________________________
Sks-devel mailing list
Sks-devel@nongnu.org
http://lists.nongnu.org/mailman/listinfo/sks-devel

Reply via email to